Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
conectiva linux vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-0715
DiskCheck script diskcheck.pl in Red Hat Linux 6.2 allows local users to create or overwrite arbitrary files via a symlink attack on a temporary file.
Kirk Bauer Diskcheck 3.1.1
Conectiva Linux 5.1
Conectiva Linux 5.0
NA
CVE-2001-0834
htsearch CGI program in htdig (ht://Dig) 3.1.5 and previous versions allows remote malicious users to use the -c option to specify an alternate configuration file, which could be used to (1) cause a denial of service (CPU consumption) by specifying a large file such as /dev/zero,...
Conectiva Linux 6.0
Conectiva Linux 7.0
Conectiva Linux 5.0
Conectiva Linux 5.1
Htdig Htdig
Suse Suse Linux 7.2
Suse Suse Linux 7.3
Suse Suse Linux 6.4
Suse Suse Linux 7.0
Suse Suse Linux 7.1
Debian Debian Linux 2.2
Suse Suse Linux 6.3
NA
CVE-2000-1134
Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.
Conectiva Linux 4.0
Conectiva Linux 4.0es
Immunix Immunix 6.2
Conectiva Linux 4.1
Conectiva Linux 4.2
Conectiva Linux 5.0
Conectiva Linux 5.1
Caldera Openlinux Eserver 2.3
Hp Hp-ux 11.11
Redhat Linux 6.0
Redhat Linux 6.1
Caldera Openlinux
Caldera Openlinux Edesktop 2.4
Mandrakesoft Mandrake Linux 7.2
Redhat Linux 5.2
Mandrakesoft Mandrake Linux 6.0
Mandrakesoft Mandrake Linux 6.1
Redhat Linux 6.2
Redhat Linux 6.2e
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux 7.1
Suse Suse Linux 7.0
2 EDB exploits
NA
CVE-2001-0128
Zope prior to 2.2.4 does not properly compute local roles, which could allow users to bypass specified access restrictions and gain privileges.
Conectiva Linux 5.0
Conectiva Linux 5.1
Conectiva Linux 6.0
Zope Zope
Redhat Linux Powertools 6.1
Redhat Linux Powertools 6.2
Redhat Linux Powertools 7.0
Conectiva Linux 4.2
Redhat Linux 6.1
Redhat Linux 6.2
Redhat Linux 7.0
Debian Debian Linux 2.2
Freebsd Freebsd 6.2
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 7.2
9.8
CVSSv3
CVE-2002-0083
Off-by-one error in the channel code of OpenSSH 2.0 up to and including 3.0.2 allows local users or remote malicious servers to gain privileges.
Conectiva Linux Graficas
Immunix Immunix 7.0
Conectiva Linux 6.0
Conectiva Linux 5.1
Openpkg Openpkg 1.0
Conectiva Linux Ecommerce
Mandrakesoft Mandrake Single Network Firewall 7.2
Conectiva Linux 7.0
Conectiva Linux 5.0
Openbsd Openssh
Mandrakesoft Mandrake Linux 7.2
Trustix Secure Linux 1.1
Suse Suse Linux 7.1
Redhat Linux 7.0
Redhat Linux 7.2
Mandrakesoft Mandrake Linux 8.1
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Mandrakesoft Mandrake Linux 7.1
Suse Suse Linux 7.3
Suse Suse Linux 7.0
Trustix Secure Linux 1.5
Suse Suse Linux 6.4
1 EDB exploit
NA
CVE-2004-0557
Multiple buffer overflows in the st_wavstartread function in wav.c for Sound eXchange (SoX) 12.17.2 up to and including 12.17.4 allow remote malicious users to execute arbitrary code via certain WAV file header fields.
Sox Sox 12.17.4
Conectiva Linux 10.0
Sox Sox 12.17.2
Sox Sox 12.17.3
Conectiva Linux 8.0
Conectiva Linux 9.0
Gentoo Linux 1.4
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux Desktop 3.0
Redhat Fedora Core Core 1.0
Redhat Fedora Core Core 2.0
2 EDB exploits
NA
CVE-2001-0690
Format string vulnerability in exim (3.22-10 in Red Hat, 3.12 in Debian and 3.16 in Conectiva) in batched SMTP mode allows a remote malicious user to execute arbitrary code via format strings in SMTP mail headers.
Conectiva Linux
University Of Cambridge Exim
Redhat Linux
Debian Debian Linux 4.0
1 EDB exploit
NA
CVE-2001-0136
Memory leak in ProFTPd 1.2.0rc2 allows remote malicious users to cause a denial of service via a series of USER commands, and possibly SIZE commands if the server has been improperly installed.
Proftpd Proftpd 1.2.0
Mandrakesoft Mandrake Linux 7.2
Debian Debian Linux 2.2
Conectiva Linux
3 EDB exploits
NA
CVE-2004-1337
The POSIX Capability Linux Security Module (LSM) for Linux kernel 2.6 does not properly handle the credentials of a process that is launched before the module is loaded, which allows local users to gain privileges.
Gnu Realtime Linux Security Module 0.8.7
Conectiva Linux 10.0
Ubuntu Ubuntu Linux 4.1
NA
CVE-2004-0801
Unknown vulnerability in foomatic-rip in Foomatic prior to 3.0.2 allows local users or remote attackers with access to CUPS to execute arbitrary commands.
Conectiva Linux 10.0
Conectiva Linux 9.0
Sun Java Desktop System 2.0
Sun Java Desktop System 2003
Linuxprinting.org Foomatic-filters 3.0.2
Linuxprinting.org Foomatic-filters 3.1
Linuxprinting.org Foomatic-filters 3.0
Linuxprinting.org Foomatic-filters 3.0.1
Trustix Secure Linux 2.1
Trustix Secure Linux 2.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »